2024-06-28 13:17:52 +00:00

133 lines
4.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202937",
"Version": "oval:org.altlinux.errata:def:20202937",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2937: package `kernel-image-rt` update to version 4.19.148-alt1.rt64",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2937",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2937",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-00106",
"RefURL": "https://bdu.fstec.ru/vul/2021-00106",
"Source": "BDU"
},
{
"RefID": "CVE-2020-25643",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rt to version 4.19.148-alt1.rt64. \nSecurity Fix(es):\n\n * BDU:2021-00106: Уязвимость модуля HDLC_PPP ядра операционной системы Linux, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-25643: A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-10-05"
},
"Updated": {
"Date": "2020-10-05"
},
"BDUs": [
{
"ID": "BDU:2021-00106",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00106",
"Impact": "High",
"Public": "20201006"
}
],
"CVEs": [
{
"ID": "CVE-2020-25643",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643",
"Impact": "High",
"Public": "20201006"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202937001",
"Comment": "kernel-headers-modules-rt is earlier than 0:4.19.148-alt1.rt64"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202937002",
"Comment": "kernel-headers-rt is earlier than 0:4.19.148-alt1.rt64"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202937003",
"Comment": "kernel-image-rt is earlier than 0:4.19.148-alt1.rt64"
}
]
}
]
}
}
]
}